· aka: Trojan Tool
Malicious MCP tool registration → tool adoption by agents → persistent backdoor in all agent workflows using the tool.
All agents using the compromised tool are persistently backdoored.
Shared tool registry (e.g. MCP) without integrity verification.